Overview
overview
9Static
static
9Awesomium.dll
windows11-21h2-x64
3AwesomiumProcess.exe
windows11-21h2-x64
1Core.dll
windows11-21h2-x64
1D3DDrv.dll
windows11-21h2-x64
1D3DX9_40.dll
windows11-21h2-x64
3DSETUP.dll
windows11-21h2-x64
7Engine.dll
windows11-21h2-x64
1Fire.dll
windows11-21h2-x64
1L2.exe
windows11-21h2-x64
7clmods.dll
windows11-21h2-x64
5en-US.dll
windows11-21h2-x64
1l2.exe
windows11-21h2-x64
7Analysis
-
max time kernel
438s -
max time network
450s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-02-2024 00:08
Behavioral task
behavioral1
Sample
Awesomium.dll
Resource
win11-20231222-en
Behavioral task
behavioral2
Sample
AwesomiumProcess.exe
Resource
win11-20231222-en
Behavioral task
behavioral3
Sample
Core.dll
Resource
win11-20231215-en
Behavioral task
behavioral4
Sample
D3DDrv.dll
Resource
win11-20231222-en
Behavioral task
behavioral5
Sample
D3DX9_40.dll
Resource
win11-20231215-en
Behavioral task
behavioral6
Sample
DSETUP.dll
Resource
win11-20231222-en
Behavioral task
behavioral7
Sample
Engine.dll
Resource
win11-20231222-en
Behavioral task
behavioral8
Sample
Fire.dll
Resource
win11-20231215-en
Behavioral task
behavioral9
Sample
L2.exe
Resource
win11-20231215-en
Behavioral task
behavioral10
Sample
clmods.dll
Resource
win11-20231215-en
Behavioral task
behavioral11
Sample
en-US.dll
Resource
win11-20231222-en
Behavioral task
behavioral12
Sample
l2.exe
Resource
win11-20231222-en
General
-
Target
L2.exe
-
Size
3.4MB
-
MD5
e0bdf54f93233062a9b59665b964d119
-
SHA1
cfc0f129fec7449b5bcf1f653496c0e010fc8c8f
-
SHA256
eb94a2b0be8318b5407fe971bfe553e554bb5e0245b3d0abc5cfc508e4c69175
-
SHA512
df3e2a772f1382222c448898c5ec6345dc3498469a786f32aacc4993727418f0e3c4522c9607ed36e60877a0a214cf0ea6c78469aa907a5ec4d8200fe71fe705
-
SSDEEP
49152:AoRTzBsn2W5xrFrH7RCVTnfgNTV+woIGBD:zRfBvW5xJrH7RCRnfgNJVkBD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
aaerrport.exepid process 4960 aaerrport.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
L2.exepid process 2080 L2.exe 2080 L2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
L2.exepid process 2080 L2.exe 2080 L2.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 692
Processes
-
C:\Users\Admin\AppData\Local\Temp\L2.exe"C:\Users\Admin\AppData\Local\Temp\L2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\ActiveAnticheat\aaerrport.exeC:\Users\Admin\AppData\Local\Temp\ActiveAnticheat\aaerrport.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ActiveAnticheat\aaerrport.exeFilesize
221KB
MD5e8fda4356557802fef6a25f431aa7094
SHA1344d6bb8229feb675986d678b608e767700c2f8c
SHA256a6386f798834b6dbf90ff99a77443a5be1fe7b723e24259266c34849dc55ffad
SHA5129f4d57c4fc4bf975dcde46f612b615d41dad068970eb33218f394e4122af3acddf6068d6f8069cfab478ad934daaffa8234dbbae757aba3b90bd67f74593ccfb
-
memory/2080-12-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/2080-29-0x0000000000400000-0x00000000032B5000-memory.dmpFilesize
46.7MB
-
memory/2080-11-0x00000000052F0000-0x00000000052F1000-memory.dmpFilesize
4KB
-
memory/2080-5-0x0000000005290000-0x0000000005291000-memory.dmpFilesize
4KB
-
memory/2080-4-0x0000000005280000-0x0000000005281000-memory.dmpFilesize
4KB
-
memory/2080-7-0x00000000052B0000-0x00000000052B1000-memory.dmpFilesize
4KB
-
memory/2080-8-0x00000000052C0000-0x00000000052C1000-memory.dmpFilesize
4KB
-
memory/2080-6-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/2080-9-0x00000000052D0000-0x00000000052D1000-memory.dmpFilesize
4KB
-
memory/2080-13-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/2080-3-0x0000000005270000-0x0000000005271000-memory.dmpFilesize
4KB
-
memory/2080-2-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/2080-10-0x00000000052E0000-0x00000000052E1000-memory.dmpFilesize
4KB
-
memory/2080-15-0x0000000005330000-0x0000000005331000-memory.dmpFilesize
4KB
-
memory/2080-14-0x0000000005320000-0x0000000005321000-memory.dmpFilesize
4KB
-
memory/2080-16-0x0000000005350000-0x0000000005351000-memory.dmpFilesize
4KB
-
memory/2080-17-0x0000000005360000-0x0000000005361000-memory.dmpFilesize
4KB
-
memory/2080-18-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/2080-19-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/2080-20-0x0000000000400000-0x00000000032B5000-memory.dmpFilesize
46.7MB
-
memory/2080-21-0x0000000000400000-0x00000000032B5000-memory.dmpFilesize
46.7MB
-
memory/2080-1-0x0000000003430000-0x0000000003431000-memory.dmpFilesize
4KB
-
memory/2080-0-0x0000000003410000-0x0000000003411000-memory.dmpFilesize
4KB